Course

Cybersecurity Capstone Project

University of Maryland, College Park

Cybersecurity Capstone Project offers an intensive hands-on experience in building secure software systems and identifying vulnerabilities in others' projects. Throughout the course, students will engage in real-world scenarios to develop and evaluate secure systems.

The course spans several weeks, during which students will immerse themselves in various aspects of cybersecurity, from project setup and development to the evaluation of other teams' systems. Through practical exercises, participants will gain valuable insights into secure software development and vulnerability assessment.

  • Engaging in a rigorous Capstone Project
  • Learning effective project setup and development
  • Evaluating the security of other teams' systems
  • Receiving feedback on evaluation results

Certificate Available ✔

Get Started / More Info
Cybersecurity Capstone Project
Course Modules

The Cybersecurity Capstone Project spans several weeks, covering project overview and setup, development of project systems, evaluation of other teams' systems, and feedback on evaluation results.

WEEK 1: CAPSTONE OVERVIEW AND SETUP

The first module, "CAPSTONE OVERVIEW AND SETUP," provides a comprehensive introduction to the project, including a simple project demo, Heroku overview, project description, schedule, group work overview, and a wrap-up of the first week. Participants will also decide on their participation in the Capstone Project.

WEEK 2-3: DEVELOPMENT OF PROJECT SYSTEM

The second module, "DEVELOPMENT OF PROJECT SYSTEM," involves the actual development of the secure software system. Participants will engage in hands-on activities to build their projects, applying the knowledge gained from the initial module.

WEEK 4-5: EVALUATION OF OTHER TEAM'S SYSTEMS

The third module, "EVALUATION OF OTHER TEAM'S SYSTEMS," focuses on assessing the security of other teams' projects. Participants will learn to identify potential vulnerabilities and apply best practices for system evaluation.

Week 6: Evaluation Feedback

The final module, "Evaluation Feedback," provides participants with valuable feedback on their evaluation results. This ensures that students gain insights into real-world security challenges and learn from their peers' assessments.

More Computer Security and Networks Courses

Cybersecurity

University of Maryland, College Park

Cybersecurity Specialization equips learners with the essential knowledge and skills to construct secure systems, employing cryptography and human-centric design....

Secure Coding Practices

University of California, Davis

Secure Coding Practices is a comprehensive Specialization that equips software developers with the skills to identify and remediate vulnerabilities while enhancing...

Secure Networked System with Firewall and IDS

University of Colorado System

This course provides comprehensive knowledge about securing network systems using firewalls and IDS for a robust defense against cyber threats.

Haz sonar la alarma: Detección y respuesta

Google

Haz sonar la alarma: Detección y respuesta a incidentes esencial para la ciberseguridad.